Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
— In third generation (3G) cellular networks, base stations are connected to base station controllers by pointto-point (usually T1/E1) links. However, today’s T1/E1 based backh...
Abstract—In this paper, we introduce a framework for distributed opportunistic scheduling in multihop wireless ad hoc networks. With the proposed framework, one can take a schedu...
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...